First published: Wed Jan 11 2017(Updated: )
Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandles certain cases that require large array allocations, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php | <7.0.15 | 7.0.15 |
redhat/php | <7.1.1 | 7.1.1 |
PHP | <7.0.15 | 7.0.15 |
PHP | >=7.0.0<7.0.15 | |
PHP | >=7.1.0<7.1.1 | |
IBM Data ONTAP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5340 has a high severity rating due to its potential to allow remote code execution and denial of service.
To fix CVE-2017-5340, upgrade PHP to version 7.0.15 or 7.1.1, depending on your current version.
CVE-2017-5340 affects PHP versions prior to 7.0.15 and 7.1.x before 7.1.1.
CVE-2017-5340 can lead to integer overflow, uninitialized memory access, and potential execution of arbitrary code.
Using PHP versions below 7.0.15 or 7.1.1 is not safe due to the vulnerabilities present in those versions.